中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
new observations on impossible differential cryptanalysis of reduced-round camellia
Author: Liu Ya ; Li Leibo ; Gu Dawu ; Wang Xiaoyun ; Liu Zhiqiang ; Chen Jiazhe ; Li Wei
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Conference Name: 19th International Workshop on Fast Software Encryption, FSE 2012
Conference Date: March 19, 2012 - March 21, 2012
Issued Date: 2012
Conference Place: Washington, DC, United states
Keyword: Lyapunov methods ; Security of data
Indexed Type: EI
ISSN: 0302-9743
ISBN: 9783642340468
Department: (1) Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China; (2) Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China; (3) School of Mathematics Shandong University Jinan 250100 China; (4) Institute for Advanced Study Tsinghua University Beijing 100084 China; (5) School of Computer Science and Technology Donghua University Shanghai 201620 China; (6) Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200240 China; (7) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Abstract: Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, by exploiting some interesting properties of the key-dependent layer, we improve previous results on impossible differential cryptanalysis of reduced-round Camellia and gain some new observations. First, we introduce some new 7-round impossible differentials of Camellia for weak keys. These weak keys that work for the impossible differential take 3/4 of the whole key space, therefore, we further get rid of the weak-key assumption and leverage the attacks on reduced-round Camellia to all keys by utilizing the multiplied method. Second, we build a set of differentials which contains at least one 8-round impossible differential of Camellia with two FL/FL-1 layers. Following this new result, we show that the key-dependent transformations inserted in Camellia cannot resist impossible differential cryptanalysis effectively. Based on this set of differentials, we present a new cryptanalytic strategy to mount impossible differential attacks on reduced-round Camellia. © 2012 Springer-Verlag.
English Abstract: Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, by exploiting some interesting properties of the key-dependent layer, we improve previous results on impossible differential cryptanalysis of reduced-round Camellia and gain some new observations. First, we introduce some new 7-round impossible differentials of Camellia for weak keys. These weak keys that work for the impossible differential take 3/4 of the whole key space, therefore, we further get rid of the weak-key assumption and leverage the attacks on reduced-round Camellia to all keys by utilizing the multiplied method. Second, we build a set of differentials which contains at least one 8-round impossible differential of Camellia with two FL/FL-1 layers. Following this new result, we show that the key-dependent transformations inserted in Camellia cannot resist impossible differential cryptanalysis effectively. Based on this set of differentials, we present a new cryptanalytic strategy to mount impossible differential attacks on reduced-round Camellia. © 2012 Springer-Verlag.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15767
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Liu Ya,Li Leibo,Gu Dawu,et al. new observations on impossible differential cryptanalysis of reduced-round camellia[C]. 见:19th International Workshop on Fast Software Encryption, FSE 2012. Washington, DC, United states. March 19, 2012 - March 21, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Liu Ya]'s Articles
[Li Leibo]'s Articles
[Gu Dawu]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Liu Ya]‘s Articles
[Li Leibo]‘s Articles
[Gu Dawu]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace